Four Apps Parents Should Monitor: PDF File

Total Page:16

File Type:pdf, Size:1020Kb

Four Apps Parents Should Monitor: PDF File 4 Apps That Should be Monitored by Parents According to Pew Research, over 78% of teens have cell phones with almost half of them having smartphones. According to a recent study, 58% of all teens between the ages of 12-17 have downloaded apps to their personal cell phones. This generation loves to communicate through their cell phones. The movement away from desktops to laptops has become problematic. The rise of sexting, bullying, prostitution, and drug use are taking place over third party mobile apps. Apps have become the new way for teens to engage in at risk behavior without the watchful eyes of their parents. The list below is the hottest apps that are being used by teenagers. 1. Snap Chat Why Your Teen Loves It Snapchat allows users to send images and videos to their friend lists. The secret sauce is that the sender can place a time limit on how long the receiver reviews the image or video. The content or “Snaps” self-destruct from 1-10 seconds based upon the time limit set by the users. After the snap self-destructs it is also deleted from the Snapchat Servers. Teens love snapchat because of its simplicity and speed. It sends photos and videos much faster than standard text messages. Teens send millions of snaps throughout the day of funny facial expressions or pictures of their pets. Why You Should Monitor It Snapchat is the number one sexting app on the market. Teens send nude snaps to their significant others under the impression that snaps self-destruct. Forensic experts have stated the snaps can easily be recovered thus they are never truly deleted from the receiver’s phone. Due to the countless number of nude snaps, porn sites have popped up over the internet to take advantage of the free content. There have also been numerous cases of bullying with the app. 2. Kik Messenger Why Your Teen Loves It KIK is a super quick instant messaging app with over 100 million users that allow teens to exchange videos, pics, and sketches. New Kik cards allow user send Youtube videos, create memes, and gifs without leaving the app. Kik Cards reached over 2 million users within first week of their launch. Why You Should Monitor It Teens are using the Kik app for sexting and dating. Teens are sending nude selfies to one another through the app. The term sex buddy is being replaced with Kik Buddy. Teens used Reddit and other forum sites to place classified ads for sex by giving out their Kik usernames. Kik does not offer any parental controls. Additionally, there is no way of authenticating users thus making it easy for pedophiles to use the messenger app. 3. The Whisper App Why Your Teen Loves It Whisper is the Teen Confession App. It allows users to superimpose text over a picture. The secret sauce is that users are anonymous thus allowing for secrets to be posted. Over 70% of whisper users are women under the age of 25. Whisper provides freedom for young users to share raw feelings and emotions over simple pictures. Why You Should Monitor It Teens have started using the app for cyberbullying. Due to the anonymous feature of the app, teens are posting pics of other teens with derogatory text superimposed on the image. Users do not have to register to use Whisper thus no user profile. Unfortunately, the app allow users to communicate with other users nearby by using the device GPS location settings. Pedophiles seek out female whisper users to establish a relationship. Recently, a Seattle, Washington man was arrested for raping a 12 year old girl that was lured to a hotel through the app. 4. Ask.fm App Why Your Teen Loves It Ask.fm is one of the hottest social networking sites that is almost exclusively used by teenagers and pre-teens. 25% of teens have posted something on ask.fm over the past 30 days. It is a question and answers site that allows user to ask anonymous questions. Ask.Fm has Twitter and Facebook integration that allows users to connect with all their friends on those popular sites. Why You Should Monitor It Due to intense bullying, Ask.fm has led to 4 documented cases of suicide in the United States, Ireland, and Great Britain. Users engage in hyper bullying by constantly asking inappropriate and derogatory questions. The app is totally anonymous and is not being monitored by the developers. The key for parents is to monitor downloaded apps on their child’s phone or mobile device. Google the apps to learn if they are dangerous or inappropriate. Try to gather all of your child’s passwords and user names for monitoring purposes and communicate with your child about why you are monitoring their activity on their mobile device. .
Recommended publications
  • What Is Gab? a Bastion of Free Speech Or an Alt-Right Echo Chamber?
    What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber? Savvas Zannettou Barry Bradlyn Emiliano De Cristofaro Cyprus University of Technology Princeton Center for Theoretical Science University College London [email protected] [email protected] [email protected] Haewoon Kwak Michael Sirivianos Gianluca Stringhini Qatar Computing Research Institute Cyprus University of Technology University College London & Hamad Bin Khalifa University [email protected] [email protected] [email protected] Jeremy Blackburn University of Alabama at Birmingham [email protected] ABSTRACT ACM Reference Format: Over the past few years, a number of new “fringe” communities, Savvas Zannettou, Barry Bradlyn, Emiliano De Cristofaro, Haewoon Kwak, like 4chan or certain subreddits, have gained traction on the Web Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2018. What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?. In WWW at a rapid pace. However, more often than not, little is known about ’18 Companion: The 2018 Web Conference Companion, April 23–27, 2018, Lyon, how they evolve or what kind of activities they attract, despite France. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3184558. recent research has shown that they influence how false informa- 3191531 tion reaches mainstream communities. This motivates the need to monitor these communities and analyze their impact on the Web’s information ecosystem. 1 INTRODUCTION In August 2016, a new social network called Gab was created The Web’s information ecosystem is composed of multiple com- as an alternative to Twitter.
    [Show full text]
  • Dating App 20140708.Key
    From ‘Like’ to Love: How Brands Can Woo Users on Messaging and Dating Apps 7/10/14 Dating goes digital The generation accustomed to communicating at all times is coming of age and bringing the same attitude to their romantic lives. ! “ I think in the time I was in a relationship, all dating communication went exclusively to text. You can’t call anybody anymore. If you call someone, they’re like ‘What? Are you on fire? Then quit wasting my time. Text me that [stuff].’” – Aziz Ansari, Comedian Credit: Comedy Central © 2013 IPG Media Lab. Proprietary & Confidential 2 We heart mobile dating apps Online dating services and apps are an increasingly common way to meet potential mates: • 1 in 3 single Americans have used an online dating service • 1 in 6 couples married in the last three years met online ! Graph Sources: marketingland.com/founders-whisper-tinder-75424; www.internetlivestats.com ! ! Sources: www.pewinternet.org/2013/10/21/online-dating-relationships/ cp.match.com/cppp/media/CMB_Study.pdf © 2013 IPG Media Lab. Proprietary & Confidential 3 Dating apps moved to mobile as messaging apps began to proliferate © 2013 IPG Media Lab. Proprietary & Confidential 4 But it’s not just dating apps Dating apps, social networks, and messaging apps are blurring as people seek, create, and document new relationships: • Glimpse connects people based on their Instagram photos • LinkedUp turns the professional site into a dating platform • Kik users share usernames instead of digits on multiple platforms © 2013 IPG Media Lab. Proprietary & Confidential 5 What’s going on here? As we noted in our white paper on Messaging Apps , messaging platforms are fighting for consumers and introducing new features to increase audience engagement.
    [Show full text]
  • The Islamic State's Use of Online Social Media
    Military Cyber Affairs Volume 1 Issue 1 Article 4 2015 The Islamic State’s Use of Online Social Media Lisa Blaker University of Maryland, Baltimore County, [email protected] Follow this and additional works at: https://scholarcommons.usf.edu/mca Part of the Communication Technology and New Media Commons, and the Social Influence and Political Communication Commons Recommended Citation Blaker, Lisa (2015) "The Islamic State’s Use of Online Social Media," Military Cyber Affairs: Vol. 1 : Iss. 1 , Article 4. https://www.doi.org/http://dx.doi.org/10.5038/2378-0789.1.1.1004 Available at: https://scholarcommons.usf.edu/mca/vol1/iss1/4 This Article is brought to you for free and open access by Scholar Commons. It has been accepted for inclusion in Military Cyber Affairs by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Blaker: The Islamic State’s Use of Online Social Media The Islamic State’s Use of Online Social Media LISA BLAKER, University of Maryland, Baltimore County 1. INTRODUCTION The Islamic State of Iraq and Syria (ISIS) has made great use of the Internet and online social media sites to spread its message and encourage others, particularly young people, to support the organization, to travel to the Middle East to engage in combat—fighting side-by-side with other jihadists, or to join the group by playing a supporting role—which is often the role carved out for young women who are persuaded to join ISIS. The terrorist group has even directed sympathizers to commit acts of violence wherever they are when traveling to the Middle East isn’t possible.
    [Show full text]
  • The Many Shades of Anonymity: Characterizing Anonymous Social Media Content
    Proceedings of the Ninth International AAAI Conference on Web and Social Media The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correay, Leandro Araújo Silvaz, Mainack Mondaly, Fabrício Benevenutoz, Krishna P. Gummadiy y Max Planck Institute for Software Systems (MPI-SWS), Germany z Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites.
    [Show full text]
  • Some Mobile Apps Add Anonymity to Social Networking
    Log in / Create an account Search Subscribe Topics+ The Download Magazine Events More+ Connectivity Some Mobile Apps Add Anonymity to Social Networking Social-networking apps that eschew real names are gaining ground. by Rachel Metz February 6, 2014 On social networks like Facebook, Twitter, and LinkedIn, most people do not communicate freely, for fear of the repercussions. For just over a decade, Facebook has enforced the idea of an authentic online identity tied to each user of a social network. This might be fine for sharing news of a promotion or new baby with friends, but sometimes you’d probably like to post a status update that won’t go on your permanent record. This urge might explain why millions of people, many of them under the age of 25, are flocking to a free smartphone app called Whisper, which lets you share thoughts—a few lines of text set against a background image—without adding your real name. Secret, a newer free app for the iPhone that shares posts anonymously through your existing social networks, is based on the same idea. After years spent filling social networks like Facebook and Twitter with the minutiae of our lives, we’ve left permanent, heavily curated trails of personal data in our wake—over 1.2 billion of them on Facebook alone, judging by its user count. New apps allow us to continue being social without worrying about the repercussions of sharing the most personal confessions. “Facebook is more like the global social network; it’s like our communication layer to the world,” says Anthony Rotolo, an assistant professor at Syracuse University, who studies social networks.
    [Show full text]
  • How Bad Can It Git? Characterizing Secret Leakage in Public Github Repositories
    How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories Michael Meli Matthew R. McNiece Bradley Reaves North Carolina State University North Carolina State University North Carolina State University [email protected] Cisco Systems, Inc. [email protected] [email protected] Abstract—GitHub and similar platforms have made public leaked in this way have been exploited before [4], [8], [21], [25], collaborative development of software commonplace. However, a [41], [46]. While this problem is known, it remains unknown to problem arises when this public code must manage authentication what extent secrets are leaked and how attackers can efficiently secrets, such as API keys or cryptographic secrets. These secrets and effectively extract these secrets. must be kept private for security, yet common development practices like adding these secrets to code make accidental leakage In this paper, we present the first comprehensive, longi- frequent. In this paper, we present the first large-scale and tudinal analysis of secret leakage on GitHub. We build and longitudinal analysis of secret leakage on GitHub. We examine evaluate two different approaches for mining secrets: one is able billions of files collected using two complementary approaches: a to discover 99% of newly committed files containing secrets in nearly six-month scan of real-time public GitHub commits and a public snapshot covering 13% of open-source repositories. We real time, while the other leverages a large snapshot covering focus on private key files and 11 high-impact platforms with 13% of all public repositories, some dating to GitHub’s creation. distinctive API key formats. This focus allows us to develop We examine millions of repositories and billions of files to conservative detection techniques that we manually and automat- recover hundreds of thousands of secrets targeting 11 different ically evaluate to ensure accurate results.
    [Show full text]
  • Characterizing Anonymous Social Media Content
    The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correa†, Leandro Araújo Silva‡, Mainack Mondal†, Fabrício Benevenuto‡, Krishna P. Gummadi† † Max Planck Institute for Software Systems (MPI-SWS), Germany ‡ Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites.
    [Show full text]
  • Check Pending Requests Instagram
    Check Pending Requests Instagram Ronen hasten impracticably? Mastoidal and calming Derk swingles: which Mahmoud is weightier enough? Petit and exaggerated Sampson dosed while conglobate Nathanil kedge her dag lambently and pistol-whips aurally. At the instagram requests received some issues But assist you delete Instagram, you permanently delete Instagram; that smart is gone forever. You can see fear of our pending requests from your dashboard and withdraw. All in that show lazy loaded images are checking account? What does this tool that you see. Facebook Tips 3 Simple Methods to thought Out Friend Gizbot. When both have too no pending requests LinkedIn will reduce that you're vision to tomorrow with people you may not expire To avoid potential. If you to't able to send an outstanding request in Instagrammeans the 'user ' or over account holder has been BLOCKED you convey you want to give request testimony the other social platform and whip the user Most of the currency you still find in same user in other social platform. Getting blocked stinks but music is also a peculiar way you see Instagram's. Accept Request. Instagram Has four Secret Inbox For Message Requests Bustle. When the collection title descriptive, automatically checked against this! Tap next step is visiting, check pending requests instagram has not. Accedere al sito Web in italiano? For instance, after you journey a partnership with gym, so you already beginning their rights. To dwell more information on these roles check will this lever on permissions. Next time i check the request access to sign using custom site and share it possible to stalk instagram login error occurred while processing this is.
    [Show full text]
  • Of Facebook in Myanmar: a Case for Corporate Criminal Liability
    The “Weaponization” of Facebook in Myanmar: A Case for Corporate Criminal Liability † NERIAH YUE The advent of social media platforms in the mid-2000s increased global communication and encouraged innovative activism by ushering new, effective ways to organize and protest. News agencies have recently reported the misuse of these platforms by individual actors and authoritarian regimes. Autocrats, in particular, twist social media platforms into weapons to silence dissent and spread hate speech. The latter category, hate speech, has contributed to some of the gravest human rights abuses globally. The increased spotlight on the weaponization of social media has motivated scholars, states, and companies to revisit the theory of corporate responsibility. This Note unpacks the potential criminal liability of social media companies for misuse on their platforms that result in grave human rights violations. Specifically, it explores Facebook’s corporate criminal liability in light of authoritarian regimes’ misuse of its platform to incite crimes against humanity. This Note will not cover jurisdictional issues regarding corporate criminal liability. Rather, it identifies on a theoretical level, which crimes, if any, social media corporations could be held accountable for under international criminal law. While there remain significant obstacles to prosecuting such cases, this Note identifies an accountability gap between Facebook’s actions and victims of human rights abuses that occur from its platform. Ultimately, this Note concludes that corporate criminal liability is an effective form of ensuring that social media companies remain responsible in doing their part to uphold human rights. † J.D. Candidate 2020, University of California, Hastings College of the Law; Executive Managing Editor, Hastings Law Journal.
    [Show full text]
  • Sarahah Is a Messaging Application Launched in November 2016 by Saudi Developer Zain Al- Abidin Tawfiq
    NATIONAL WHITE COLLAR CRIME CENTER Background Sarahah is a messaging application launched in November 2016 by Saudi developer Zain al- Abidin Tawfiq. The word “Sarahah” is the pronunciation of the Arabic word for “honesty.” It was originally launched as a service for businesses in Arabic-speaking regions to solicit anonymous, candid feedback from their employees and co-workers. However, it quickly went viral in Saudi Arabia and Egypt as an anonymous messaging application.2 Building on its regional success, Sarahah rapidly gained traction in North America, Europe, and Australia. A recent update integrated its functionality and network into Snapchat, one of the most popular social media apps in the world. This prompted an explosive growth in popularity, with over 14 million registered users and 20 million unique daily visitors (it is possible to leave messages in Sarahah without creating an account). 3 What is Sarahah? Sarahah provides a free network to leave anonymous messages through a public profile that a user shares with other people. Anyone with a user’s profile name can anonymously message that user, without necessarily creating an account. Sarahah can be used via web browser or by installing an app on an iOS or Android device. New accounts can be created only via the mobile app. Registration is required in order to receive messages. New users register with an email address, username, password, first and last name, and “handle” or profile name. The username is used to log in to the service, but only the profile name is displayed to other users. The personal link to receive anonymous messages automatically becomes www.PROFILE_NAME.Sarahah.com, and cannot be changed.
    [Show full text]
  • Forensic Analysis of Kik Messenger on Ios Devices Ovens, Kenneth M.; Morison, Gordon
    Forensic analysis of Kik messenger on iOS devices Ovens, Kenneth M.; Morison, Gordon Published in: Digital Investigation DOI: 10.1016/j.diin.2016.04.001 Publication date: 2016 Document Version Author accepted manuscript Link to publication in ResearchOnline Citation for published version (Harvard): Ovens, KM & Morison, G 2016, 'Forensic analysis of Kik messenger on iOS devices', Digital Investigation, vol. 17, pp. 40–52. https://doi.org/10.1016/j.diin.2016.04.001 General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Take down policy If you believe that this document breaches copyright please view our takedown policy at https://edshare.gcu.ac.uk/id/eprint/5179 for details of how to contact us. Download date: 29. Sep. 2021 Forensic analysis of Kik messenger on iOS devices Kenneth M. Ovens∗, Gordon Morison School of Engineering & Built Environment, Glasgow Caledonian University, Cowcaddens Road, Glasgow, G4 0BA, Scotland. Abstract Instant messaging applications continue to grow in popularity as a means of communicating and sharing multimedia files. The information contained within these applications can prove invaluable to law enforcement in the investigation of crimes. Kik messenger is a recently introduced instant messaging application that has become very popular in a short period of time, especially among young users. The novelty of Kik means that there has been little forensic examination conducted on this application. This study addresses this issue by investigating Kik messenger on Apple iOS devices.
    [Show full text]
  • Kik Interactive Inc
    Case 1:19-cv-05244 Document 1 Filed 06/04/19 Page 1 of 49 Stephan J. Schlegelmilch David S. Mendel U.S. SECURITIES AND EXCHANGE COMMISSION Division of Enforcement 100 F Street, N.E. Washington, DC 20549 Counsel for Plaintiff UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK U.S. SECURITIES AND EXCHANGE COMMISSION, Plaintiff, Case No. 19-cv-5244 vs. Jury Trial Demanded KIK INTERACTIVE INC. Defendant. COMPLAINT Plaintiff United States Securities and Exchange Commission (the “SEC”) alleges as follows against Defendant Kik Interactive Inc. (“Kik”): SUMMARY 1. From May to September 2017, Kik offered and sold one trillion digital tokens called “Kin.” More than 10,000 investors worldwide purchased Kin for approximately $100 million in U.S. dollars and digital assets – over half of this sum coming from investors located in the United States. However, Kik’s offer and sale of Kin was not registered with the SEC, and investors did not receive the disclosures required by the federal securities laws. 2. Congress enacted the Securities Act of 1933 to regulate the offer and sale of securities. In contrast to ordinary commerce, which often operates under the principle of caveat emptor, Congress enacted a regime of full and fair disclosure, requiring those who offer and sell securities to Case 1:19-cv-05244 Document 1 Filed 06/04/19 Page 2 of 49 the investing public to provide sufficient, accurate information to allow investors to make informed decisions before they invest. Such disclosure is ordinarily provided in a “registration statement,” which provides public investors with financial and managerial information about the issuer of the securities, details about the terms of the securities offering, the proposed use of investor proceeds, and an analysis of the risks and material trends that would affect the enterprise.
    [Show full text]